Learn how to use internal network penetration technology to deploy services without a public IP address. This guide covers setting up a TCP tunnel with ngrok an
Explore a detailed analysis of white list bypass techniques in file upload scenarios. Understand common methods and real-world examples to protect against serve
Discover the detailed process of a penetration test against a car manufacturer during an advanced cybersecurity competition. Learn about information collection
Explore the full process of a social engineering phishing attack, from crafting a convincing resume to executing the payload. Understand how attackers use techn
Explore a detailed account of a successful penetration test on xx company’s domain control system. Learn about asset recognition, tunnel establishment, and key
This article details a red team operation targeting a small-scale company with only 30 employees. The case explores methods such as phishing and process injecti
Explore the process of handling and decoding JavaScript encryption in web applications during penetration testing. Discover how to identify and analyze encrypti